Toward Efficient Search for a Fragment Network in a Large Semantic Database

Size: px
Start display at page:

Download "Toward Efficient Search for a Fragment Network in a Large Semantic Database"

Transcription

1 Toward Efficient Search for a Fragment Network in a Large Semantic Database M. Goldberg, J. Greenman, B. Gutting, M. Magdon-Ismail, J. Schwartz, W. Wallace Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY {goldberg, green7, guttiba, magdon, schwaj3}@cs.rpi.edu; wallaw@rpi.edu Abstract In this paper, we present a novel indexing scheme for semantic graphs, which is based on the notion of the i-degree of a node. We apply this scheme to identify in a large semantic graph, the database, a fragment network, which may represent incomplete information that an analyst collected on an adversary network of interest. I. INTRODUCTION. We present an approach to searching in a large semantic graph, the database, for a subgraph which approximately matches a small network, the fragment. The following practical situation motivates the problem. An intelligence analyst has discovered a small hidden network that connects people, events, places, etc., and presented the result of the investigation as the fragment graph. Suppose the analyst wishes to compare the data s/he has collected so far (the fragment) with the data in a central database which contains the union of accumulated intelligence. While the information collected by the analyst might be scarce, incomplete, and even unreliable, the information in the database accumulated by other analysts over a long period of time should be more complete and reliable. Inversely, the newly accumulated data may contain items not found, or not available, earlier. The task is to find, in the central database, statistically significant approximate matches to the fragment. The difficulty of the problem arises from its close relation to the classical NP-hard computational problem of identifying, in a given large graph, a subgraph which is isomorphic to a given fragment graph ([1, 2]). On the other hand, the nature of the input semantic graphs with labeled nodes and edges offers a possibility to achieve efficiency for an average input. However, the theoretical aspect of the problem is only one part of the challenge. The main difficulty of the problem stems from the lack of a strict definition of an approximate match. In the real life situation, the analyst working on the problem relies on his/her intuition and experience to identify a significant likelihood of his/her guess. Thus, to develop a system that helps the analyst, it is necessary to create a tool which can easily incorporate this knowledge and intuition. Our approach can easily accommodate the analyst s input, or hints, during deployment. A similar problem is that of querying a database of graphs. Given a graph query, the task is to quickly retrieve graphs from a large database which contain the query. The traditional approach ([4, 6]) is to perform the search via graph-based indices. We apply the general indexing idea to our problem of searching for a substructure (a fragment match) in a large structure (the database graph), and present it as a two-stage process: (a) an off-line indexing of the graph database; and (b) an on-line search which employs the results of indexing. In the practical setting, indexing would be performed infrequently, while the indexing-enabled search would have to be executed for every specific search request, and is expected to be very fast. We index an arbitrary semantic graph via the computing of i-degrees of its nodes. The i-degrees of the nodes are used to construct a hierarchical set of nodepartitionings, where each next partitioning is a subpartitioning of the previous one. It turns out, that for the classes of graphs that we tested (large random graphs and the Wikipedia-graph on 1.1 million nodes) even the 3-degree partitioning splits the node set in partitions of average size close to 2. This implies that when the fragment contains a near-complete information about some node, it can be located in the database almost uniquely. This property is useful even if the information is not complete. Our search algorithm starts by computing the i- degrees of the nodes of the fragment and selecting some representative node, the anchor. The i-degrees of the anchor is then compared to that of the database nodes, and a few closest nodes are returned. The identification of a match for the anchor is an important first step in the general fragment identification problem. This anchor search can be complemented by finding network communities that the anchor is a member of (see [3]). We test our search algorithms on two classes of inputs: randomly generated graph and the Wikipedia-graph (see Section IV.) It turns out that the search on randomly generated graphs yields very good results. Thus random graphs are easy, as opposed to the real life graphs. It is considerably harder to achieve good accuracy for the Wikipedia-graph due to its non-uniformity. It is likely

2 that any successful search would have to be based on assumptions provided by an analyst related to the shape of the subgraph to match a given fragment. II. DEFINITIONS We assume that the nodes of the input graph are labeled by non-confusable types such as person, place, event, and so on. The types are distinct from general labels that may be incorrect. Thus, while a person is not confused with an event, the names (labels) John and Josef can be confused. In real application, the user may deal with labels that s/he considers completely reliable, so those labels can be used as types. For convenience, we assume that types are enumerated 1, 2, 3,..., t, where t is the total number of types used. Our graphs are directed; all notations used but not defined here can be found in [5]. i-deg: given node x, the i-deg(x) is a vector of length t, where the k th coordinate is the number of paths of length i that start at x and end at nodes of type k. By extension, 0-deg(x) is the vector representing the type of x. i-dist: this function computes the similarity of two nodes of the same type by comparing their i-degrees. This is calculated by the Manhattan distance between the vectors: i-dist(v, w) = i t j=1 k=1 j-deg(v)[k] j-deg(w)[k] Dominating i-distance: this, like i-distance, is also a measure of similarity, but requires that the first node s i-deg dominates the second, that is at every k th position the first is not less than the second; else, the dominating i-distance is considered to be some very large constant. Fuzziness: this is a measure of the number of nodes within a graph for which a particular node v is similar to. Two nodes may be considered r-fuzzy to each other if similarity(v, w) < r for some r 0. Indexing: indexing is the process of assigning values to nodes as a preprocessing step. Each node is assigned i-degrees for i = [0, k]; indexing yields a hierarchical partitioning of the node-set. N(x): this denotes the set of neighbors of x. The neighbors are the nodes that have incoming edges from x. That is: v N(x) iff (x, v) E Diversity: dvst(x) is the count of the unique types in N(x); a node x is more diverse than a node y if dvst(x) > dvst(y) or if dvst(x) = dvst(y) and N(x) > N(y). The problem we are solving is that of detecting the location of the fragment anchor in the database. Input: semantic graphs G and F ; and a node z V (F); Output: a node c V (G), which is similar to z. III. SEARCH ALGORITHM This section details the algorithm used for locating anchors within the database. We assume the database has been pre-processed; each node is assigned i-degrees, for i = [0, k], where k is a preselected integer. Before the query step, we have an indexed database graph G, and a query fragment graph F. We index F using the same range i = [0, k] as was used for indexing G. Also, we are either given, or obtain algorithmically, an anchor node x from F. Two possible methods of determining x include: choosing the most diverse node in F, or the node with the largest neighborhood. Once an anchor x is specified, we search for a match to x within the database. All nodes of the database are ranked using the preselected similarity method, i- distance or dominating i-distance. Then the top n candidates are returned, where n is predetermined. Searching for a single node using similarity of i-deg is the basic approach we use. A more advanced method makes use of some number of neighbors of the anchor, m. These nodes are the m most diverse neighbors of x. Algorithm 1 Fragment Search Require: 1. fragment graph F 2. anchor node x F 3. database graph G 4. i for the maximum i-degree to compare 5. n for the number of candidates to return 6. m for the number of neighbors to use in the search 7. a similarity function Similarity(node, node) Let D be the sorted list of the m most diverse nodes in N(x) for v s.t. v G AND type(v) = type(x) do d Similarity(v, x) for j : 1 m do d temp min w N(v) (Similarity(w, D[j])) d d + d temp candidates candidates pair(d, v) return the best n candidates IV. GRAPH GENERATION Wikipedia Graph The main graph we used for testing was constructed from Wikipedia. Each page is a node and page-links are edges. Some, but not all, pages also have semantic information, including types. Only pages with semantic type information are used in the graph. We used DBpedia.org, a website which stores a variety of Wikipedia databases. We used Ontology Infobox Types to gather the node and type information and Raw Infobox Properties for the edges. Nodes which

3 had neither incoming nor outgoing neighbors were removed from the graph. The resultant graph has the following properties. TABLE I WIKIPEDIA GRAPH PROPERTIES Nodes Types Max Outdegree Edges Random Graph The random graphs are the second type of graphs used for experimentation; we generate them using statistics collected from the Wikipedia graph. To do this we redistributed all the incoming edges uniformly amongst the nodes, and then reassigned the types randomly between nodes. Since the edges are uniformly distributed, this alters their i-degrees, which in particular, develops more unique i-degs. This graph has the same number of edges, but slightly fewer nodes, , because some nodes were isolated during the random edge distribution, and these nodes are removed by post-processing. V. PARTITIONING The search for an anchor (or the fragment) is influenced by the number of nodes with the same i-deg. If this number is too large, the search may require an n which is larger than is reasonable for an analyst to use. Thus, it is important that the partitioning of the database by i-degrees yields small, on average, partitions. The partitioning data for the Wiki graph is presented in TABLE II. TABLE II WIKIPEDIA GRAPH PARTITIONING STATISTICS #Parts Max size Avg. size Std. Dev 0-deg deg deg deg This tables shows us that partitioning by 1-deg provides on average 65.7 nodes with the same 0-deg and 1-deg. A partitioning by 3-deg shows an average of 2.5 nodes with the same 0-,1-,2-, and 3-deg. This however only solves part of the problem. Because we are attempting to locate fragments which may be missing data or contain new information, we must consider that nodes can have different i-degs. That is, even if y G is the ideal match to x F, x may not have identical i-degrees to y. Consider r-fuzziness, as we increase maximum difference, r, these groups grow very quickly. This indicates that searching for a node by i-deg alone will not guarantee good precision. TABLE III 3-DISTANCE FUZZINESS FOR 100 RANDOMLY SAMPLED NODES r Avg Max VI. FRAGMENT GENERATION ALGORITHMS As part of our testing methodology, we sought to extract fragments from the database, anonymize them, and relocate them within the database using our algorithm. The algorithms below describe different methods of creating fragments. Note that the subgraphs generated are induced subgraphs on the nodes: all possible edges that existed in the database graph G will exist in the fragment graph F. Algorithm 2 Fragment Generation e (exact 1- Neighborhood): Require: 1. large graph G; 2. a maximum fragment size n F (V, E ) Randomly select x G such that N(x) < n V (F) {x} N(x) if 2 N(x) + V (F) > n then choose n V (F) nodes at random from 2-N(x) else add all 2-N(x) to F. The first fragment generation method, e, guarantees that the 1-deg(x) will remain the same. The second method, n, is a variation on the first in that it does not guarantee complete information about the structure of N(x). The final generation method uses a random walk with restarts. In our testing we used p = 0.9 and α = 0.7. VII. VALIDATION AND RESULTS To validate the accuracy of the algorithm we test it with several different input parameters: fragment generation methods; search parameters; levels of i-dist indexing, etc. In table IV, fragment size is listed across the top. Bold text represents searches using the dominating i- dist, instead of the i-dist. Each cell represents a query for 100 anchor nodes, x, with m neighbors for m=0..3. The fragment samples are generated around the same 100 anchor nodes across all tests and were constructed from the P -random walk algorithm unless otherwise specified. For each of these tests, increasing m increases the precision. The greatest benefit for this database is seen when increasing from 0 neighbors to 1 neighbor. Furthermore, if we look at the difference between the i- dist and dominating i-dist, we see a great improvement

4 Algorithm 3 Fragment Generation n Require: 1. a graph G 2. a maximum size n Randomly select x G such that N(x) > 3 Add x to V (F) m [3, min( neighbors(x), n 1)] Choose at random m nodes from N(x) and add these nodes to F if V (F) < n then V {v v G AND v / F AND (u, v) where u F } if V + V (F) n then add all v V to F else select at random n V (F) unique nodes from V and add each to V (F) in precision. This is to be expected because more information is guaranteed. Also we notice that the larger the fragment, the higher the precision. This is to be expected, because the information of the fragment will more closely resemble the graph. Fig. 1. RandomGraph, Search: 2-dist, Fragment Size:20 Figure 1 shows the precision of our algorithm over 60 guesses. This demonstrates that as we search for more neighbors we get better results, however we do not need all 60 guesses to obtain this performance. Many of the successful searches occur within the first few guesses. On the other hand, in some databases it may be desirable to have more than 60 results returned. Algorithm 4 Fragment Generation P-Random Walk p Require: 1. graph G 2. maximum size n 3. probability p 4. constant α Fig. 2. RandomGraph, Search: Dominating 2-dist, Fragment Size:20 Choose randomly x G such that N(x) > 2 Add x to V (F) u x previoussize 1 while V (F) < n p >= p (α n ) do Choose at random a node w from N(u G) Attempt to add w to V (F) u w restart false With probability p, restart true if restart then u x if V (F) = previoussize then p p α previoussize = V (F) In Figure 2, even though after 60 guesses the dominating searches all reach over 90% success, many of the correct guesses were within the first 5 guesses. This reveals how much more reliable a search is with dominating i-dist. Though we can t say this trend will be true of all graphs, in our experiments the precision curves followed this general trend. Fig. 3. RandomGraph, Search: Dominating i-dist, Fragment Size:20 TABLE IV PRECISION AFTER 60 TRIES. RANDOM GRAPH, SEARCH: 2-DIST m When using the dominating i-dist (Figure 3), the precision increases as i increases. When using the simple i- dist, however, the precision increases until i = 3 at which

5 point the likelihood of success decreases significantly. This is because we weight all penalties equally. However, the potential for error of a fragment node s 3-deg is higher than that of its 2- or 1-deg. When not using dominating i-dist, this over penalizes the incompleteness of the fragment. Fig. 6. WikiGraph, Search: 2-dist, Fragment Size:20 TABLE V PRECISION AFTER 60 TRIES. WIKI GRAPH, SEARCH: 2-DIST m More nodes in the fragment yield better results, and searching for more neighbors also yields better results. In TABLE V, we see that for these parameters, the results are lower than for the random graph, due to the more difficult nature of the Wiki-graph s i-degree distribution. This is an obstacle which we hope to overcome. TABLE VI SECONDS FOR 100 QUERIES. WIKI GRAPH, SEARCH: 2-DIST m increase in run time when increasing the fragment size is negligible, because only a few nodes from the fragment are used. However, increasing m greatly increases the runtime. Fig. 5. Fig. 4. WikiGraph, Search: Dominating 2-dist WikiGraph, Search: Dominating 2-dist, Fragment Size:20 In figure 5, we show the performance of our algorithm for each of our fragment generation methods. We can see that the methods all produce similar patterns of precision over 60 guesses. Method e, however, has higher precision because it contains the full 1-deg of the anchor node. This information is slightly more distinguishing than the random-walk information. Finally, in TABLE VI is the time requirement to run 100 tests for various fragment sizes, and m values. The VIII. FUTURE WORK Our experiments indicate that the probability of the search to be successful increases with the size of the fragment, which should be expected since a bigger size decreases the possibility of confusing the search. We notice that selecting special neighbors of the anchors has a positive affect on the search. This feature is a partial implementation of the total alignment of the fragment in the database graph. Although incorporating the total alignment should improve the accuracy, the difficulty of this improvement relates to the computational complexity of this operation. The only practical algorithm available is based on the backtracking strategy, and is time consuming, as a result. Thus, to make the operation fast, the backtracking needs to be restricted, which may negatively affect the accuracy of the resulting procedure. Another important observation is related to the role of guesses by the user. We expect that any software system for solving the fragment identification problem to be very flexible when accommodating the users suggestions. Acknowledgment. This research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.

6 REFERENCES [1] M. R. Garey and D. S. Johnson. Computers and intractability: A guide to the theory of npcompleteness. W.H. Freeman and Company, [2] M. Goldberg. The graph isomorphism problem. Handbook of Graph Theory, pages 68 78, [3] M. Goldberg, S. Kelley, M. Magdon-Ismail, and W. Wallace. Overlapping communities in social networks. Proc. 2nd Confernence on Social Computation (SocialCom), pages , [4] J. Y. Shijie Zhang, Meng Hu. Treepi: A novel graph indexing method. Proc. of ICDE 2007; 23rd IEEE International Conference on Data Engineering, pages , [5] D. B. West. Introduction to graph theory. Prentice Hall, Upper Saddle River, NJ, [6] J. H. Xifeng Yan, Philip S. Yu. Graph indexing: a frequent structure-based approach. Proc. of the 2004 ACM SIGMOD International Conference on Management of Data, pages , 2004.

Graph Search Beyond Text: Relational Searches in Semantic Hyperlinked Data

Graph Search Beyond Text: Relational Searches in Semantic Hyperlinked Data Graph Search Beyond Text: Relational Searches in Semantic Hyperlinked Data M. Goldberg, J. Greenman, B. Gutting, M. Magdon-Ismail, J. Schwartz, W. Wallace Computer Science Department, Rensselaer Polytechnic

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

Some Elementary Lower Bounds on the Matching Number of Bipartite Graphs

Some Elementary Lower Bounds on the Matching Number of Bipartite Graphs Some Elementary Lower Bounds on the Matching Number of Bipartite Graphs Ermelinda DeLaViña and Iride Gramajo Department of Computer and Mathematical Sciences University of Houston-Downtown Houston, Texas

More information

A Distributed Cooperative Target Tracking with Binary Sensor Networks

A Distributed Cooperative Target Tracking with Binary Sensor Networks A Distributed Cooperative Target Tracking with Binary Sensor Networks Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking

More information

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Using ɛ-dominance for Hidden and Degenerated Pareto-Fronts

Using ɛ-dominance for Hidden and Degenerated Pareto-Fronts IEEE Symposium Series on Computational Intelligence Using ɛ-dominance for Hidden and Degenerated Pareto-Fronts Heiner Zille Institute of Knowledge and Language Engineering University of Magdeburg, Germany

More information

An Edge-Swap Heuristic for Finding Dense Spanning Trees

An Edge-Swap Heuristic for Finding Dense Spanning Trees Theory and Applications of Graphs Volume 3 Issue 1 Article 1 2016 An Edge-Swap Heuristic for Finding Dense Spanning Trees Mustafa Ozen Bogazici University, mustafa.ozen@boun.edu.tr Hua Wang Georgia Southern

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

Mining Web Data. Lijun Zhang

Mining Web Data. Lijun Zhang Mining Web Data Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Web Crawling and Resource Discovery Search Engine Indexing and Query Processing Ranking Algorithms Recommender Systems

More information

More Efficient Classification of Web Content Using Graph Sampling

More Efficient Classification of Web Content Using Graph Sampling More Efficient Classification of Web Content Using Graph Sampling Chris Bennett Department of Computer Science University of Georgia Athens, Georgia, USA 30602 bennett@cs.uga.edu Abstract In mining information

More information

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4) S-72.2420/T-79.5203 Basic Concepts 1 S-72.2420/T-79.5203 Basic Concepts 3 Characterizing Graphs (1) Characterizing Graphs (3) Characterizing a class G by a condition P means proving the equivalence G G

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

Kernelization Upper Bounds for Parameterized Graph Coloring Problems

Kernelization Upper Bounds for Parameterized Graph Coloring Problems Kernelization Upper Bounds for Parameterized Graph Coloring Problems Pim de Weijer Master Thesis: ICA-3137910 Supervisor: Hans L. Bodlaender Computing Science, Utrecht University 1 Abstract This thesis

More information

Web page recommendation using a stochastic process model

Web page recommendation using a stochastic process model Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,

More information

Discovering Frequent Geometric Subgraphs

Discovering Frequent Geometric Subgraphs Discovering Frequent Geometric Subgraphs Michihiro Kuramochi and George Karypis Department of Computer Science/Army HPC Research Center University of Minnesota 4-192 EE/CS Building, 200 Union St SE Minneapolis,

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Ranking Clustered Data with Pairwise Comparisons

Ranking Clustered Data with Pairwise Comparisons Ranking Clustered Data with Pairwise Comparisons Alisa Maas ajmaas@cs.wisc.edu 1. INTRODUCTION 1.1 Background Machine learning often relies heavily on being able to rank the relative fitness of instances

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

A Fast and Simple Heuristic for Constrained Two-Level Crossing Reduction

A Fast and Simple Heuristic for Constrained Two-Level Crossing Reduction A Fast and Simple Heuristic for Constrained Two-Level Crossing Reduction Michael Forster University of Passau, 94030 Passau, Germany forster@fmi.uni-passau.de Abstract. The one-sided two-level crossing

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H. Abstract We discuss a class of graphs called perfect graphs. After defining them and getting intuition with a few simple examples (and one less simple example), we present a proof of the Weak Perfect Graph

More information

A Study on Reverse Top-K Queries Using Monochromatic and Bichromatic Methods

A Study on Reverse Top-K Queries Using Monochromatic and Bichromatic Methods A Study on Reverse Top-K Queries Using Monochromatic and Bichromatic Methods S.Anusuya 1, M.Balaganesh 2 P.G. Student, Department of Computer Science and Engineering, Sembodai Rukmani Varatharajan Engineering

More information

SANDRA SPIROFF AND CAMERON WICKHAM

SANDRA SPIROFF AND CAMERON WICKHAM A ZERO DIVISOR GRAPH DETERMINED BY EQUIVALENCE CLASSES OF ZERO DIVISORS arxiv:0801.0086v2 [math.ac] 17 Aug 2009 SANDRA SPIROFF AND CAMERON WICKHAM Abstract. We study the zero divisor graph determined by

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

The NP-Completeness of Some Edge-Partition Problems

The NP-Completeness of Some Edge-Partition Problems The NP-Completeness of Some Edge-Partition Problems Ian Holyer y SIAM J. COMPUT, Vol. 10, No. 4, November 1981 (pp. 713-717) c1981 Society for Industrial and Applied Mathematics 0097-5397/81/1004-0006

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

Math 443/543 Graph Theory Notes

Math 443/543 Graph Theory Notes Math 443/543 Graph Theory Notes David Glickenstein September 3, 2008 1 Introduction We will begin by considering several problems which may be solved using graphs, directed graphs (digraphs), and networks.

More information

High Dimensional Indexing by Clustering

High Dimensional Indexing by Clustering Yufei Tao ITEE University of Queensland Recall that, our discussion so far has assumed that the dimensionality d is moderately high, such that it can be regarded as a constant. This means that d should

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Cooperative Data Dissemination to Mission Sites

Cooperative Data Dissemination to Mission Sites Cooperative Data Dissemination to Mission Sites Fangfei Chen a, Matthew P. Johnson b, Amotz Bar-Noy b and Thomas F. La Porta a a Department of Computer Science and Engineering, the Pennsylvania State University

More information

Math 443/543 Graph Theory Notes

Math 443/543 Graph Theory Notes Math 443/543 Graph Theory Notes David Glickenstein September 8, 2014 1 Introduction We will begin by considering several problems which may be solved using graphs, directed graphs (digraphs), and networks.

More information

Search Algorithms for Discrete Optimization Problems

Search Algorithms for Discrete Optimization Problems Search Algorithms for Discrete Optimization Problems Ananth Grama, Anshul Gupta, George Karypis, and Vipin Kumar To accompany the text ``Introduction to Parallel Computing'', Addison Wesley, 2003. Topic

More information

Polynomial-time Algorithm for Determining the Graph Isomorphism

Polynomial-time Algorithm for Determining the Graph Isomorphism American Journal of Information Science and Computer Engineering Vol. 3, No. 6, 2017, pp. 71-76 http://www.aiscience.org/journal/ajisce ISSN: 2381-7488 (Print); ISSN: 2381-7496 (Online) Polynomial-time

More information

analyzing the HTML source code of Web pages. However, HTML itself is still evolving (from version 2.0 to the current version 4.01, and version 5.

analyzing the HTML source code of Web pages. However, HTML itself is still evolving (from version 2.0 to the current version 4.01, and version 5. Automatic Wrapper Generation for Search Engines Based on Visual Representation G.V.Subba Rao, K.Ramesh Department of CS, KIET, Kakinada,JNTUK,A.P Assistant Professor, KIET, JNTUK, A.P, India. gvsr888@gmail.com

More information

Unsupervised Learning and Clustering

Unsupervised Learning and Clustering Unsupervised Learning and Clustering Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2008 CS 551, Spring 2008 c 2008, Selim Aksoy (Bilkent University)

More information

A System for Bidirectional Robotic Pathfinding

A System for Bidirectional Robotic Pathfinding A System for Bidirectional Robotic Pathfinding Tesca K. Fitzgerald Department of Computer Science, Portland State University PO Box 751 Portland, OR 97207 USA tesca@cs.pdx.edu TR 12-02 November 2012 Abstract

More information

University of Florida CISE department Gator Engineering. Clustering Part 4

University of Florida CISE department Gator Engineering. Clustering Part 4 Clustering Part 4 Dr. Sanjay Ranka Professor Computer and Information Science and Engineering University of Florida, Gainesville DBSCAN DBSCAN is a density based clustering algorithm Density = number of

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

Efficient homomorphism-free enumeration of conjunctive queries

Efficient homomorphism-free enumeration of conjunctive queries Efficient homomorphism-free enumeration of conjunctive queries Jan Ramon 1, Samrat Roy 1, and Jonny Daenen 2 1 K.U.Leuven, Belgium, Jan.Ramon@cs.kuleuven.be, Samrat.Roy@cs.kuleuven.be 2 University of Hasselt,

More information

Results on the min-sum vertex cover problem

Results on the min-sum vertex cover problem Results on the min-sum vertex cover problem Ralucca Gera, 1 Craig Rasmussen, Pantelimon Stănică 1 Naval Postgraduate School Monterey, CA 9393, USA {rgera, ras, pstanica}@npsedu and Steve Horton United

More information

An Energy Efficient Location Service for Mobile Ad Hoc etworks

An Energy Efficient Location Service for Mobile Ad Hoc etworks An Energ Efficient Location Service for Mobile Ad Hoc etworks Zijian Wang, Euphan Bulut and Boleslaw K. Szmanski, Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 280 USA {wangz,

More information

Chapter 5. Track Geometry Data Analysis

Chapter 5. Track Geometry Data Analysis Chapter Track Geometry Data Analysis This chapter explains how and why the data collected for the track geometry was manipulated. The results of these studies in the time and frequency domain are addressed.

More information

A Virtual Laboratory for Study of Algorithms

A Virtual Laboratory for Study of Algorithms A Virtual Laboratory for Study of Algorithms Thomas E. O'Neil and Scott Kerlin Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract Empirical studies

More information

Graph Vertex Colorability & the Hardness. Mengfei Cao COMP-150 Graph Theory Tufts University

Graph Vertex Colorability & the Hardness. Mengfei Cao COMP-150 Graph Theory Tufts University Dec. 15 th, Presentation for Final Project Graph Vertex Colorability & the Hardness Mengfei Cao COMP-150 Graph Theory Tufts University Framework In General: Graph-2-colorability is in N Graph-3-colorability

More information

GADDI: Distance Index based Subgraph Matching in Biological Networks

GADDI: Distance Index based Subgraph Matching in Biological Networks GADDI: Distance Index based Subgraph Matching in Biological Networks Shijie Zhang, Shirong Li, and Jiong Yang Dept. of Electrical Engineering and Computer Science Case Western Reserve University 10900

More information

Clustering Part 4 DBSCAN

Clustering Part 4 DBSCAN Clustering Part 4 Dr. Sanjay Ranka Professor Computer and Information Science and Engineering University of Florida, Gainesville DBSCAN DBSCAN is a density based clustering algorithm Density = number of

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

On the Design of a Quality-of-Service Driven Routing Protocol for Wireless Cooperative Networks

On the Design of a Quality-of-Service Driven Routing Protocol for Wireless Cooperative Networks On the Design of a Quality-of-Service Driven Routing Protocol for Wireless Cooperative Networks Zhengguo Sheng, Zhiguo Ding, and Kin K Leung Department of Electrical and Electronic Engineering Imperial

More information

Biology, Physics, Mathematics, Sociology, Engineering, Computer Science, Etc

Biology, Physics, Mathematics, Sociology, Engineering, Computer Science, Etc Motivation Motifs Algorithms G-Tries Parallelism Complex Networks Networks are ubiquitous! Biology, Physics, Mathematics, Sociology, Engineering, Computer Science, Etc Images: UK Highways Agency, Uriel

More information

Highway Dimension and Provably Efficient Shortest Paths Algorithms

Highway Dimension and Provably Efficient Shortest Paths Algorithms Highway Dimension and Provably Efficient Shortest Paths Algorithms Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Joint with Ittai Abraham, Amos Fiat, and Renato

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

FastA & the chaining problem

FastA & the chaining problem FastA & the chaining problem We will discuss: Heuristics used by the FastA program for sequence alignment Chaining problem 1 Sources for this lecture: Lectures by Volker Heun, Daniel Huson and Knut Reinert,

More information

Chapter S:II. II. Search Space Representation

Chapter S:II. II. Search Space Representation Chapter S:II II. Search Space Representation Systematic Search Encoding of Problems State-Space Representation Problem-Reduction Representation Choosing a Representation S:II-1 Search Space Representation

More information

Value Added Association Rules

Value Added Association Rules Value Added Association Rules T.Y. Lin San Jose State University drlin@sjsu.edu Glossary Association Rule Mining A Association Rule Mining is an exploratory learning task to discover some hidden, dependency

More information

A Graph Theoretic Approach to Image Database Retrieval

A Graph Theoretic Approach to Image Database Retrieval A Graph Theoretic Approach to Image Database Retrieval Selim Aksoy and Robert M. Haralick Intelligent Systems Laboratory Department of Electrical Engineering University of Washington, Seattle, WA 98195-2500

More information

Distance-based Outlier Detection: Consolidation and Renewed Bearing

Distance-based Outlier Detection: Consolidation and Renewed Bearing Distance-based Outlier Detection: Consolidation and Renewed Bearing Gustavo. H. Orair, Carlos H. C. Teixeira, Wagner Meira Jr., Ye Wang, Srinivasan Parthasarathy September 15, 2010 Table of contents Introduction

More information

A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology

A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology Carlos A. S. OLIVEIRA CAO Lab, Dept. of ISE, University of Florida Gainesville, FL 32611, USA David PAOLINI

More information

FastA and the chaining problem, Gunnar Klau, December 1, 2005, 10:

FastA and the chaining problem, Gunnar Klau, December 1, 2005, 10: FastA and the chaining problem, Gunnar Klau, December 1, 2005, 10:56 4001 4 FastA and the chaining problem We will discuss: Heuristics used by the FastA program for sequence alignment Chaining problem

More information

5 Graph Theory Basics

5 Graph Theory Basics November 14, 2017 5 Graph Theory Basics William T. Trotter trotter@math.gatech.edu Basic Definitions Definition A graph G is a pair (V, E) where V is a finite set and E is a set of 2-element subsets of

More information

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge Centralities (4) By: Ralucca Gera, NPS Excellence Through Knowledge Some slide from last week that we didn t talk about in class: 2 PageRank algorithm Eigenvector centrality: i s Rank score is the sum

More information

Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012

Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 6, 2012 Solving Assembly Line Balancing Problem in the State of Multiple- Alternative

More information

SELECTION METRICS FOR COOPERATIVE MULTIHOP RELAYING

SELECTION METRICS FOR COOPERATIVE MULTIHOP RELAYING SELECTION METRICS FOR COOPERATIVE MULTIHOP RELAYING Jonghyun Kim and Stephan Bohacek Department of Electrical and Computer Engineering University of Delaware Newark, DE 19716 kim,bohacek@eecis.udel.edu

More information

Potential Bisections of Large Degree

Potential Bisections of Large Degree Potential Bisections of Large Degree Stephen G Hartke and Tyler Seacrest Department of Mathematics, University of Nebraska, Lincoln, NE 68588-0130 {hartke,s-tseacre1}@mathunledu June 6, 010 Abstract A

More information

ECE 5775 (Fall 17) High-Level Digital Design Automation. Fixed-Point Types Analysis of Algorithms

ECE 5775 (Fall 17) High-Level Digital Design Automation. Fixed-Point Types Analysis of Algorithms ECE 5775 (Fall 17) High-Level Digital Design Automation Fixed-Point Types Analysis of Algorithms Announcements Lab 1 on CORDIC is released Due Friday 9/8 @11:59am MEng TA: Jeffrey Witz (jmw483) Office

More information

Bounds on the signed domination number of a graph.

Bounds on the signed domination number of a graph. Bounds on the signed domination number of a graph. Ruth Haas and Thomas B. Wexler September 7, 00 Abstract Let G = (V, E) be a simple graph on vertex set V and define a function f : V {, }. The function

More information

Mining Minimal Contrast Subgraph Patterns

Mining Minimal Contrast Subgraph Patterns Mining Minimal Contrast Subgraph Patterns Roger Ming Hieng Ting James Bailey Abstract In this paper, we introduce a new type of contrast pattern, the minimal contrast subgraph. It is able to capture structural

More information

Fuzzy Cognitive Maps application for Webmining

Fuzzy Cognitive Maps application for Webmining Fuzzy Cognitive Maps application for Webmining Andreas Kakolyris Dept. Computer Science, University of Ioannina Greece, csst9942@otenet.gr George Stylios Dept. of Communications, Informatics and Management,

More information

Improving the Efficiency of Fast Using Semantic Similarity Algorithm

Improving the Efficiency of Fast Using Semantic Similarity Algorithm International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Improving the Efficiency of Fast Using Semantic Similarity Algorithm D.KARTHIKA 1, S. DIVAKAR 2 Final year

More information

DELAY-TOLERANT networks (DTNs) [1] are wireless

DELAY-TOLERANT networks (DTNs) [1] are wireless 1530 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 Cost-Effective Multiperiod Spraying for Routing in Delay-Tolerant Networks Eyuphan Bulut, Member, IEEE, Zijian Wang, and Boleslaw

More information

Matching and Factor-Critical Property in 3-Dominating-Critical Graphs

Matching and Factor-Critical Property in 3-Dominating-Critical Graphs Matching and Factor-Critical Property in 3-Dominating-Critical Graphs Tao Wang a,, Qinglin Yu a,b a Center for Combinatorics, LPMC Nankai University, Tianjin, China b Department of Mathematics and Statistics

More information

Graphs with Two Disjoint Total Dominating Sets

Graphs with Two Disjoint Total Dominating Sets Graphs with Two Disjoint Total Dominating Sets Izak Broere, Rand Afrikaans University Michael Dorfling, Rand Afrikaans University Wayne Goddard, University of Natal Johannes H. Hattingh, Georgia State

More information

A novel supervised learning algorithm and its use for Spam Detection in Social Bookmarking Systems

A novel supervised learning algorithm and its use for Spam Detection in Social Bookmarking Systems A novel supervised learning algorithm and its use for Spam Detection in Social Bookmarking Systems Anestis Gkanogiannis and Theodore Kalamboukis Department of Informatics Athens University of Economics

More information

Theorem 3.1 (Berge) A matching M in G is maximum if and only if there is no M- augmenting path.

Theorem 3.1 (Berge) A matching M in G is maximum if and only if there is no M- augmenting path. 3 Matchings Hall s Theorem Matching: A matching in G is a subset M E(G) so that no edge in M is a loop, and no two edges in M are incident with a common vertex. A matching M is maximal if there is no matching

More information

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR Detecting Missing and Spurious Edges in Large, Dense Networks Using Parallel Computing Samuel Coolidge, sam.r.coolidge@gmail.com Dan Simon, des480@nyu.edu Dennis Shasha, shasha@cims.nyu.edu Technical Report

More information

31.6 Powers of an element

31.6 Powers of an element 31.6 Powers of an element Just as we often consider the multiples of a given element, modulo, we consider the sequence of powers of, modulo, where :,,,,. modulo Indexing from 0, the 0th value in this sequence

More information

A Vizing-like theorem for union vertex-distinguishing edge coloring

A Vizing-like theorem for union vertex-distinguishing edge coloring A Vizing-like theorem for union vertex-distinguishing edge coloring Nicolas Bousquet, Antoine Dailly, Éric Duchêne, Hamamache Kheddouci, Aline Parreau Abstract We introduce a variant of the vertex-distinguishing

More information

Basics of Graph Theory

Basics of Graph Theory Basics of Graph Theory 1 Basic notions A simple graph G = (V, E) consists of V, a nonempty set of vertices, and E, a set of unordered pairs of distinct elements of V called edges. Simple graphs have their

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Handling Missing Values via Decomposition of the Conditioned Set

Handling Missing Values via Decomposition of the Conditioned Set Handling Missing Values via Decomposition of the Conditioned Set Mei-Ling Shyu, Indika Priyantha Kuruppu-Appuhamilage Department of Electrical and Computer Engineering, University of Miami Coral Gables,

More information

Solving Traveling Salesman Problem Using Parallel Genetic. Algorithm and Simulated Annealing

Solving Traveling Salesman Problem Using Parallel Genetic. Algorithm and Simulated Annealing Solving Traveling Salesman Problem Using Parallel Genetic Algorithm and Simulated Annealing Fan Yang May 18, 2010 Abstract The traveling salesman problem (TSP) is to find a tour of a given number of cities

More information

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents E-Companion: On Styles in Product Design: An Analysis of US Design Patents 1 PART A: FORMALIZING THE DEFINITION OF STYLES A.1 Styles as categories of designs of similar form Our task involves categorizing

More information

Chordal Graphs and Minimal Free Resolutions

Chordal Graphs and Minimal Free Resolutions Chordal Graphs and Minimal Free Resolutions David J. Marchette David A. Johannsen Abstract The problem of computing the minimal free resolution of the edge ideal of a graph has attracted quite a bit of

More information

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12. AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a

More information

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM SERGIY I. BUTENKO, CLAYTON W. COMMANDER, AND PANOS M. PARDALOS Abstract. In this paper, a Broadcast Scheduling Problem (bsp) in a time division multiple

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Combined Weak Classifiers

Combined Weak Classifiers Combined Weak Classifiers Chuanyi Ji and Sheng Ma Department of Electrical, Computer and System Engineering Rensselaer Polytechnic Institute, Troy, NY 12180 chuanyi@ecse.rpi.edu, shengm@ecse.rpi.edu Abstract

More information

The Iterative Multi-Agent Method for Solving Complex Search Problems

The Iterative Multi-Agent Method for Solving Complex Search Problems The Iterative Multi-Agent Method for Solving Complex Search Problems Kamran Karimi Department of Computer Science University of Regina Regina, Saskatchewan Canada S4S 0A2 karimi@cs.uregina.ca Abstract.

More information

Dr. Amotz Bar-Noy s Compendium of Algorithms Problems. Problems, Hints, and Solutions

Dr. Amotz Bar-Noy s Compendium of Algorithms Problems. Problems, Hints, and Solutions Dr. Amotz Bar-Noy s Compendium of Algorithms Problems Problems, Hints, and Solutions Chapter 1 Searching and Sorting Problems 1 1.1 Array with One Missing 1.1.1 Problem Let A = A[1],..., A[n] be an array

More information